The original Seven Essays, in a cool, new outfit ...
Call 412-567-OXEN [6936] Fax 412-567-6936 Email - [email protected]

All posts in General Questions

Too often, individuals will jump right into developing a research proposal with little to no thought of planning. That approach does not maximize the potential of the research to be usable and of value to the overall body of knowledge in the particular discipline or profession.

To develop a research proposal, it is imperative to understand the following critical concepts or components such as the following:

? Research hypothesis
? Research problem statement
? Null hypothesis
? Research variables
? Literature review
? Database versus search engine
? Random sampling
? Data collection
? Quantitative research
? Reliability

For this assignment, you are to prepare a report regarding research proposals in which you answer the following questions:

1. What is a research hypothesis, and how does it differ from the research question?
2. What should be included in the research problem statement?
3. Define a null hypothesis. When would it be used?
4. What are the criteria for establishing research variables?
5. What is the purpose of the literature review in the research proposal?
6. What is a database, and how does it differ from a search engine?
7. What is random sampling, and why is it considered a stronger sampling method than nonrandomized sampling?
8. What are the major methods used for data collection in research?
9. What are the main steps to a research proposal in a quantitative research study?
10. Define reliability. What are 3 aspects of reliability in quantitative research?

Self Assessment

Discuss the following as it relates to you.

Summary Self-Evaluation:address the following points:

1. Do I enjoy bargaining? Do I enjoy being in situations of conflict, and/or do I enjoy attempting to persuade others to my point of view? Why?

2. Do others see me as a good bargainer? Am I seen as strong or weak? Am I perceived as one who gives in easily, or holds out too long, or knows when to make concessions and tradeoffs?

3. How do I see myself in relation to the question in (2) above?

4. How effective am I at persuading others? How effective are my verbal skills to argue my points?

5. At what time do I feel most competent in bargaining? Least competent?

6. How do I respond when I hold the power in a situation? How do I respond when I have little or no power in a situation?

7. Overall, what are my major strengths and weaknesses as a negotiator, and what kind of learning goals must I set for myself for the future?

The key here in the end is the future. Have your views changed regarding these questions as a result of this class? Will you continue, based on this class, to improve your self assessment?

This is a case study i preparing for analysis purposes, to study on Security of information in commercial or business organisations.

*This is a general approach, with no specific size of organisation or industry type.

5 topics to cover:

(1) Definitions of human, technical and physical information assets at potential risk in commercial or business organisations.

(2) Definitions and descriptions of the terms, ‘integrity’, ‘availability’ and ‘confidentiality’ in relation to the security protection of information assets in commercial or business organisations, i.e. what is it about these assets that must be protected?

(3) Risks inherent in commercial or business organisations: for example, malware and Trojan horses, hackers, insider risks (social engineering) and threats, physical weaknesses

(4) Implications of the threats that put commercial or business organisations at risk.

(5) Suggested counter-measures for commercial or business organisations, namely:
- technical counter-measures
- physical counter-measures
- personnel counter-measures

Each topic should contain an introduction of what each topic means, definitions if required, and detailed explanation, possibly some examples that can aid in understanding the topic better.

This analysis must be based on the work of credible and relevant authors (not personal opinions about information security management). Hence please list in bullet points, the URLs, title/author of book, journal, etc.

**No need include any citation or quoting** as this is purely my own analysis work.
in doc/docx format.